Lucene search

K
freebsdFreeBSDCDB5E0E3-FAFC-11EE-9C21-901B0E9408DC
HistoryApr 03, 2024 - 12:00 a.m.

go -- http2: close connections when receiving too many headers

2024-04-0300:00:00
vuxml.freebsd.org
9
go project
hpack state
headers
continuation frames
maxheaderbytes
memory allocation
http/2 endpoint
attacker
huffman-encoded data
header data
security vulnerability
connection closure
unix

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

13.3%

The Go project reports:

http2: close connections when receiving too many headers
Maintaining HPACK state requires that we parse and
process all HEADERS and CONTINUATION frames on a
connection. When a request’s headers exceed MaxHeaderBytes,
we don’t allocate memory to store the excess headers but we
do parse them. This permits an attacker to cause an HTTP/2
endpoint to read arbitrary amounts of header data, all
associated with a request which is going to be
rejected. These headers can include Huffman-encoded data
which is significantly more expensive for the receiver to
decode than for an attacker to send.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgo122< 1.22.2UNKNOWN
FreeBSDanynoarchgo121< 1.21.9UNKNOWN